Security Issues in Cloud Computing
EOI: 10.11242/viva-tech.01.06.001
Citation
Prof. Krutika Vartak, Rupendra Kumar Jangid, "Security Issues in Cloud Computing", VIVA-IJRI Volume 1, Issue 6, Article MCA_01, pp. 1-6, 2023. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.
Abstract
Cloud computing has come a vital tool for businesses and individualities to store and access data and operations. Still, with the adding reliance on Cloud services comes an increased threat of security breaches and data loss. The security concerns in cloud computing, such as data breaches, unauthorized access, and lack of transparency, are explored in this paper. also, the paper explores implicit results to these issues, similar as enforcing strong authentication protocols, encryption, and regular security checkups. It's important for associations to be apprehensive of these security pitfalls and take applicable measures to cover their data and systems in the Cloud.
Keywords
Cloud computing, Data breaches, Data protection, Security audits, Security issues
References
- Q. Wang, N. Li, K. Ren, and W. Lou, "Toward secure and dependable storage services in cloud computing," IEEE Transactions on Services Computing, 12(2), 2019, pp. 266-279.
- A. Al-Fuqaha, M. Guizani, M. Mohammady, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications”, IEEE Communications Surveys & Tutorials, 17(4), 2015, pp. 2347-2376.
- J. Garcia-Alfaro, E. de Lara, and P. Veríssimo, "Cloud computing and data protection: A survey of legal and technical issues," IEEE Communications Surveys & Tutorials, 20(3), 2018, pp. 1778-1819.
- G. Wang, J. Zhang, and J. Li, "A survey on cloud service models," IEEE Access, 8, 2020, pp. 78532-78546.
- P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology, 53(6), 2011, pp. 50-53.
- G. Wei, Y. Chen, and Y. Liu, "A survey on cloud service models and architectures," IEEE Communications Surveys & Tutorials, 19(3), 2017, pp. 1617-1644.
- A. Beloglazov, R. Buyya, and J. Abawajy, "Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers," Concurrency and Computation: Practice and Experience, 25(13), 2013, pp. 1397-1420.
- S. Kshetri, "Cloud computing and information security,"Journal of Information Privacy and Security, 9(3), 2013, pp. 131-149.
- N. L. B. Pouwelse, P. J. A. Buhr, and M. J. G. Van Sinderen, "Cloud computing security challenges," Journal of Cloud Computing: Advances, Systems and Applications, 2(1), 2013, pp. 1-20.
- A. Alharbi, A. Alqahtani, and K. Alkhalaf, "A survey of cloud computing security issues," Journal of Network and Computer Applications, 36(6), 2013, pp. 1417-1432.
- S. S. Al-Saggaf, "Security issues in cloud computing: A survey," Journal of Information and Communication Technologies, 5(2), 2015, pp. 1-15.
- S. R. H. Raza, A. A. Al-Dubai, and T. Ahmed, "A comprehensive survey of security issues in cloud computing," Journal of Network and Computer Applications, 34(1), 2011, pp. 1-11.
- P. Mell, T. Grance, and K. Scarfone, Guidelines on security and privacy in public cloud computing (National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011).
- K. C. C. Chang, "Qualitative research: The field of the field”, Qualitative Research in Organizations and Management: An International Journal, 2(2), 2007, pp. 1-16.
- J. Creswell and V. Plano Clark, Designing and Conducting Mixed Methods Research (Sage, 2011).
- S. K. S. Gupta, "Cloud service providers' security measures," International Journal of Advanced Research in Computer Science and Software Engineering, 3(12), 2013, pp. 1-7.
- M. A. Sookhak, S. Khan, R. Z. Khan, A. Ghani, and M. H. Alam, "Security in cloud computing: Opportunities and challenges," Future Generation Computer Systems, 82, 2018, pp. 29-50.
- S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, 34(1), 2011, pp. 1-11.
- M. Almorsy, J. Grundy, and A. Ibrahim, "Cloud computing security: A systematic literature review," Future Generation Computer Systems, 79, 2018, pp. 849-861.